recentpopularlog in

laurakalbag : encryption   54

Five-Eyes nations to force encryption backdoors - Security - iTnews
While the rhetoric is sharp, the specifics are vague. Governments won't specify any particular interception technology, and will leave it to technology companies to create the solutions required that provide lawful access capability.

Creating so-called backdoors in applications and services to enable communications interception capabilities for law enforcement has persistently been criticised by cryptography and security experts as dangerous for decades now.

Despite the criticism and concerns that backdoors in Western equipment and services could be exploited and abused by totalitarian regimes elsewhere in the world, the Five-Eyes countries have pursued interception capabilities, saying not having these would undermine the rule of law.
fiveeyes  backdoor  encryption  snooperscharter  governmentsurveillance  surveillance 
september 2018 by laurakalbag
UK government says it will NOT try to ban encryption - Business Insider
“We accept and completely recognise the importance of encryption”
uk  government  encryption  uturn  roundup  17jul15 
july 2015 by laurakalbag
No encryption? How very rude. - Using Our Intelligence
And before you all leap on me with cries of “using only PGP is no guar­an­tee of secur­ity.…” I do know that you need a suite of tools to have a fight­ing chance of real pri­vacy in this NSA-saturated age: open source soft­ware, PGP, TOR, Tails, OTR, old hard­ware, you name it.  But I do think the wide-spread adop­tion of PGP sets a good example and gets more people think­ing about these wider issues.  Per­haps more of us should insist on it before com­mu­nic­at­ing further.
encryption  pgp  email  privacy  security  m15  machon  indie  indieroundup  notincluded 
april 2015 by laurakalbag
NSA dreams of smartphones with “split” crypto keys protecting user data | Ars Technica
National Security Agency officials are considering a range of options to ensure their surveillance efforts aren't stymied by the growing use of encryption, particularly in smartphones. Key among the solutions, according to The Washington Post, might be a requirement that technology companies create a digital key that can open any locked device to obtain text messages or other content, but divide the key into pieces so no one group could use it without the cooperation of other parties.

"I don't want a back door," Adm. Michael S. Rogers, director of the NSA, recently said during a speech at Princeton University, at which he laid out the proposal. "I want a front door. And I want the front door to have multiple locks. Big locks."
splitkey  encryption  backdoors  frontdoors  indie  indieroundup  government  surveillance  notincluded 
april 2015 by laurakalbag
Noose around Internet’s TLS system tightens with 2 new decryption attacks
“The noose around the neck of the Internet's most widely used encryption scheme got a little tighter this month with the disclosure of two new attacks that can retrieve passwords, credit card numbers and other sensitive data from some transmissions protected by secure sockets layer and transport layer security protocols.” By André Mendes on Ars Technica
encryption  security  indie  indieroundup  notincluded 
april 2015 by laurakalbag
Free Encrypted iPhone Comms And 'World First' Private Tablet Unveiled
“It’s been a great day for privacy-minded folk, with the launch of free encrypted messaging and calls for Apple’s iPhone, thanks to Open Whisper Systems’ updated Signal application, and what’s being billed by creator Silent Circle as the “world’s first privacy focused tablet”” By Thomas Fox-Brewster on Forbes
apple  openwhispersystems  silentcircle  silentphone  encryption  privacy  indie  indieroundup  notincluded 
march 2015 by laurakalbag
Google quietly backs away from encrypting new Lollipop devices by default
“Last year, Google made headlines when it revealed that its next version of Android would require full-disk encryption on all new phones… But we're starting to see new Lollipop phones from Google's partners, and they aren't encrypted by default, contradicting Google's previous statements.” By Andrew Cunningham on arstechnica
encryption  hardware  indie  indieroundup  notincluded  google 
march 2015 by laurakalbag
The United States Is Angry That China Wants Crypto Backdoors, Too
“The Chinese government is about to pass a new counter terrorism law that would require tech companies operating in the country to turn over encryption keys and include specially crafted code in their software and hardware so that chinese authorities can defeat security measures at will.” By Lorenzo Franceschi-Bicchierai on Motherboard
backdoors  encryption  china  us  government  surveillance  indie  indieroundup  notincluded 
march 2015 by laurakalbag
What NSA Director Mike Rogers Doesn’t Get About Encryption
“If a “golden key” that works against an entire class of systems is cracked or compromised, the entire system is vulnerable—which makes it worthwhile for sophisticated attackers to devote enormous resources to compromising that key, far beyond what it would make sense to expend on the key for any single individual or company.”
indie  indieroundup  notincluded  encryption  goldenkeys  backdoors  nsa  surveillance  security  cryptography 
february 2015 by laurakalbag
NSA Joins FBI in Fight Against Total Encryption
The Director of the National Security Agency repeated a dubious claim, previously made by one of the nation’s top law enforcement officers, boasting that American security services can crack a type of increasingly popular encryption without completely undermining the privacy-preserving technique.
nsa  fbi  encryption  security  privacy  indie  indieroundup  notincluded 
february 2015 by laurakalbag
The Great SIM Heist — How Spies Stole the Keys to the Encryption Castle
“The U.S. and British intelligence agencies pulled off the encryption key heist in great stealth, giving them the ability to intercept and decrypt communications without alerting the wireless network provider, the foreign government or the individual user that they have been targeted.” By Jeremy Scahill and Josh Begley on The Intercept
hardware  sim  encryption  privacy  surveillance  government  indie  indieroundup  20feb2015 
february 2015 by laurakalbag
Let's Encrypt
When Let’s Encrypt launches in Summer 2015, enabling HTTPS for your site will be as easy as installing a small piece of certificate management software on the server.
encrypt  encryption  userexperience  ux  data  privacy  security  indie  indieroundup  13feb2014 
february 2015 by laurakalbag

Copy this bookmark:





to read